Skip to content
View jdsecurity's full-sized avatar
  • New York

Block or report jdsecurity

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

😎 Awesome lists about all kinds of interesting topics

449,327 33,773 Updated Mar 9, 2026

The fastest path to AI-powered full stack observability, even for lean teams.

C 78,231 6,386 Updated Mar 27, 2026

Defund the Police.

13,555 2,664 Updated Jun 7, 2024

Exploitation Framework for Embedded Devices

Python 13,045 2,389 Updated Mar 2, 2026

PowerSploit - A PowerShell Post-Exploitation Framework

PowerShell 12,922 4,723 Updated Aug 17, 2020

Attack Surface Management Platform

Shell 9,625 2,040 Updated Feb 15, 2026

The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb

7,851 1,880 Updated Nov 10, 2022

Empire is a PowerShell and Python post-exploitation agent.

PowerShell 7,833 2,930 Updated Jan 19, 2020

SQLI labs to test error based, Blind boolean based, Time based.

PHP 5,741 1,560 Updated Dec 11, 2023

爆破字典

Python 5,274 2,866 Updated Mar 21, 2022

This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public expl…

Python 4,183 1,040 Updated May 11, 2023

Proxy [Finder | Checker | Server]. HTTP(S) & SOCKS 🎭

Python 4,131 1,164 Updated Mar 18, 2024

Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.

Python 3,870 829 Updated May 20, 2025

从零开始内网渗透学习

3,017 989 Updated Apr 8, 2016

HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux

C 2,974 577 Updated Feb 24, 2025

Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor

Python 2,451 476 Updated May 6, 2024

A minimal but powerful thread pool in ANSI C

C 2,320 646 Updated May 18, 2025

Great security list for fun and profit

1,861 349 Updated Dec 14, 2022

Post Exploitation Collection

C 1,572 359 Updated May 1, 2020

A PoC backdoor that uses Gmail as a C&C server

Python 1,349 421 Updated Nov 16, 2018

Harmlessly goof up your co-workers browser and chrome dev tools

CSS 1,271 126 Updated Mar 27, 2019

A Ruby framework designed to aid in the penetration testing of WordPress systems.

Ruby 1,044 264 Updated Nov 24, 2019

SQL Vulnerability Scanner

Ruby 980 231 Updated Jan 11, 2018

Advanced search in search engines, enables analysis provided to exploit GET / POST capturing emails & urls, with an internal custom validation junction for each target / url found.

PHP 884 400 Updated Apr 9, 2021

A collection of static SSH keys (public and private) that have made their way into software and hardware products.

853 119 Updated Feb 13, 2025

Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.

C 823 316 Updated Apr 11, 2023

👀 Linux kernel mode debugfs keylogger

C 676 82 Updated Apr 15, 2022

PenBox - A Penetration Testing Framework - The Tool With All The Tools , The Hacker's Repo

Python 532 205 Updated Nov 4, 2016

An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically

Python 497 191 Updated Sep 21, 2021

Virtualbox, VirtualMachine, Cuckoo, Anubis, ThreatExpert, Sandboxie, QEMU, Analysis Tools Detection Tools

C++ 462 118 Updated Nov 22, 2018
Next